Term
Minimum cable type necessary to carry 1000-Base T signal |
|
Definition
|
|
Term
What statement about an ethernet address is accurate? |
|
Definition
The address used in an Ethernet LAN directs data to the proper receiving location |
|
|
Term
T/F Before a host can send data to another host, it must have the MAC address of that host. |
|
Definition
|
|
Term
What is the purpose of network interconnections? |
|
Definition
To provide a means for data to travel from one point to another in the network. |
|
|
Term
T/F A LAN is a network that is located in a limited area, with the computers and other components that are part of this network located relatively close together. |
|
Definition
|
|
Term
The source port in both a UDP header and a TCP header is a ____. |
|
Definition
16-bit number of the calling port |
|
|
Term
T/F In the OSI model, the data link layer provides network services to the applications of the user, such as e-mail, file transfer, and terminal emulation. |
|
Definition
|
|
Term
T/F In the OSI model, the application layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. |
|
Definition
|
|
Term
Which field in a TCP header ensures that data arrives in correct order? |
|
Definition
|
|
Term
Which organization is responsible for Ethernet standards? |
|
Definition
|
|
Term
When a single computer with one IP address has several websites open at once, this is called ____. |
|
Definition
|
|
Term
Which characteristic is similar between TCP and UDP? |
|
Definition
Operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack |
|
|
Term
T/F Speed indicates how easily users can access the network. |
|
Definition
|
|
Term
T/F LANs do not provide resource-sharing functions for their users. |
|
Definition
|
|
Term
Which two factors have recently influenced the increase in threats from hackers? |
|
Definition
Hacker tools require less technical knowledge to use. Hacker tools have become more sophisticated |
|
|
Term
Which three statements about networks are accurate? |
|
Definition
A main office can have hundreds or even thousands of people who depend on network access to do their jobs. A network is a connected collection of devices that can communicate with each other. Networks are used to transmit data in many kinds of environments, including homes, small businesses, and large enterprises. |
|
|
Term
In a mesh topology, each device has a connection to all of the other devices. |
|
Definition
|
|
Term
In a Class B address, which of the octest are the host address portion and are assigned locally? |
|
Definition
The third and fourth octets are assigned locally. |
|
|
Term
Windowing provides which of the following services? |
|
Definition
The receiver can transmit a specified number of unacknowledged segments. |
|
|
Term
T/F Speed indicates how fast data is transmitted over the network. |
|
Definition
|
|
Term
A UTP Category 5e consists of four pairs of 24-gauge copper wires, which can transmit data at speeds up to 4 Mb/s. |
|
Definition
|
|
Term
Which three addresses are private IP addresses? |
|
Definition
Class C192.168.X.X Class B 172.16-31.X.X Class A 10.X.X.X |
|
|
Term
In the OSI model, the physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. |
|
Definition
|
|
Term
Acknowledgement and windowing are two forms of ____. |
|
Definition
|
|
Term
What is the main threat to a closed network? |
|
Definition
Deliberate or accidental attack from inside |
|
|
Term
Which two statements about the purpose of the OSI model are accurate? |
|
Definition
The OSI model facilitates an understanding of how information travels throughout a network. The OSI model defines the network functions that occur at each layer. |
|
|
Term
How many bits are in an IPv4 address? |
|
Definition
|
|
Term
Which statement about logical topologies is accurate? |
|
Definition
A logical topology describes the paths that the signals travel from one point on a network to another |
|
|
Term
What is the purpose of a switch? |
|
Definition
spanking
To provide network attachment to the end systems and intelligent switching of the data within the local network. |
|
|
Term
T/F Layer 2 addresses are IP addresses |
|
Definition
|
|
Term
Which resource is not sharable on a network? |
|
Definition
|
|